You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -305,7 +308,7 @@ You can create roles and grant these roles directly to an individual user, or ev
305
308
- *CLIENT_SECRET* is listed in your ODM Application, in the **Credentials** tab
306
309
- *KEYCLOAK_SERVER_URL* is the issuer that can be retrieved using the **OpenID Endpoint Configuration** link of the **General** tab in the **Configure**/**Realm settings** menu
307
310
308
-
By introspecting the access_token value with the online tool [https://jwt.io](https://jwt.io), you should get:
311
+
By introspecting the access_token value with a JWT decoder tool, you should get:
309
312
310
313
```
311
314
{
@@ -324,16 +327,16 @@ You can create roles and grant these roles directly to an individual user, or ev
324
327
This token is used for the invocation of the ODM components like the Decision Center, Decision Server console, and the invocation of the Decision Server Runtime REST API.
- *CLIENT_ID* is your ODM Application, default is odm, can be retrieved in the **Manage** / **Clients** menu
332
335
- *CLIENT_SECRET* is listed in your ODM Application, in the **Credentials** tab
333
336
- *KEYCLOAK_SERVER_URL* is the issuer that can be retrieved using the **OpenID Endpoint Configuration** link of the **General** tab in the **Configure**/**Realm settings** menu
334
-
- *USERNAME* and *PASSWORD* have been created from 'Create at least one user that belongs to this new group.' section.
337
+
- The credentials used are from 'Create at least one user that belongs to this new group.' section.
335
338
336
-
By introspecting the id_token value with the online tool [https://jwt.io](https://jwt.io), you should get:
339
+
By introspecting the id_token value with a JWT decoder tool, you should get:
337
340
338
341
```
339
342
{
@@ -419,8 +422,8 @@ You can create roles and grant these roles directly to an individual user, or ev
419
422
- `webSecurity.xml` contains the mapping between Liberty J2EE ODM roles and Keycloak groups and users:
420
423
* rtsAdministrators/resAdministrators/resExecutors ODM roles are given to the CLIENT_ID (which is seen as a user) to manage the client-credentials flow
421
424
- `openIdWebSecurity.xml` contains two openIdConnectClient Liberty configurations:
422
-
*for web access to Decision Center and Decision Server consoles using userIdentifier="preferred_username" with the Authorization Code flow
423
-
*for the rest-api call using userIdentifier="preferred_username" with the client-credentials flow
425
+
*the first for web access to Decision Center and Decision Server consoles with the Authorization Code flow
426
+
*the second for the rest-api calls with the client-credentials flow
424
427
- `openIdParameters.properties` configures several features like allowed domains, logout, and some internal ODM openid features
425
428
- `ldap-configurations.xml` contains LDAP configuration for [How to import Keycloak Groups and Users using SCIM](README_FINE_GRAIN_PERMISSION.md)
426
429
@@ -451,7 +454,7 @@ You can create roles and grant these roles directly to an individual user, or ev
451
454
The output should look like:
452
455
```shell
453
456
NAME CHART VERSION APP VERSION DESCRIPTION
454
-
ibm-helm/ibm-odm-prod 24.1.0 9.0.0.1 IBM Operational Decision Manager
457
+
ibm-helm/ibm-odm-prod 25.0.0 9.5.0.0 IBM Operational Decision Manager
455
458
```
456
459
457
460
### 3. Run the `helm install` command
@@ -464,6 +467,7 @@ You can now install the product. We will use the PostgreSQL internal database an
@@ -561,10 +566,12 @@ You can now install the product. We will use the PostgreSQL internal database an
561
566
562
567
### Access the ODM services
563
568
564
-
Well done! You can now connect to ODM using the endpoints you got [earlier](#register-the-odm-redirect-url) and log in as an ODM admin with the account you created in [the first step](#create-a-dedicated-odm-realm) (e.g. johndoe@mycompany.com/johndoe).
569
+
Well done! You can now connect to ODM using the endpoints you got [earlier](#register-the-odm-redirect-url) and log in as an ODM admin with the account you created in [the first step](#create-a-dedicated-odm-realm) (e.g. `johndoe@mynicecompany.com` / `johndoe`).
565
570
566
571
### Set up Rule Designer
567
572
573
+
First set up Rule Designer following [these instructions](https://www.ibm.com/docs/en/odm/9.5.0?topic=designer-installing-rule-online).
574
+
568
575
To be able to securely connect your Rule Designer to the Decision Server and Decision Center services that are running in Certified Kubernetes, you need to establish a TLS connection through a security certificate in addition to the OpenID configuration.
569
576
570
577
1. Get the following configuration files.
@@ -582,7 +589,7 @@ To be able to securely connect your Rule Designer to the Decision Server and Dec
582
589
```
583
590
Where:
584
591
- *changeme* is the fixed password to be used for the default truststore.jks file.
585
-
- *ECLIPSEINITDIR* is the Rule Designer installation directory next to the eclipse.ini file.
592
+
- *ECLIPSEINITDIR* is the Rule Designer installation directory where the eclipse.ini file is.
586
593
587
594
4. Restart Rule Designer.
588
595
@@ -594,13 +601,13 @@ Get hands-on experience with IBM Operational Decision Manager in a container env
594
601
595
602
### Calling the ODM Runtime Service
596
603
597
-
To manage ODM runtime calls, we use the [Loan Validation Decision Service project](https://github.com/DecisionsDev/odm-for-container-getting-started/blob/master/Loan%20Validation%20Service.zip)
604
+
Log inthe Business Console as John Doe (`johndoe@mynicecompany.com` / `johndoe`).
598
605
599
-
Import the **Loan Validation Service**in Decision Center connected as John Doe.
606
+
Import the Decision Service named [Loan Validation Service](https://github.com/DecisionsDev/odm-for-container-getting-started/blob/master/Loan%20Validation%20Service.zip) if it is not already there.
600
607
601
608

602
609
603
-
Deploy the **Loan Validation Service** production_deployment ruleapps using the **production deployment** deployment configuration in the Deployments>Configurations tab.
610
+
Deploy the **Loan Validation Service** production_deployment ruleapp using the **production deployment** deployment configuration in the Deployments>Configurations tab.
604
611
605
612

606
613
@@ -622,21 +629,21 @@ If you want to perform a bearer authentication ODM runtime call using the Client
622
629
623
630
```
624
631
curl -k -X POST -H "Content-Type: application/x-www-form-urlencoded" \
0 commit comments